Open AccessDOI
Security and Privacy Issues in IoT
Aqeel ur Rehman,Sadiq Ur Rehman,Iqbal Uddin Khan,Muzaffar Moiz,Sarmad Hasan +4 more
- Vol. 8, Iss: 3
Reads0
Chats0
TLDR
Major issues related to security and privacy of IoT are focused and are focused on authentication, Identification and device heterogeneity.Abstract:
Internet of Things (IoT) is a global network of physical and virtual ‘things’ connected to the internet. Each object has unique ID which is used for identification. IoT is the emerging technology which will change the way we interact with devices. In future almost every electronic device will be a smart device which can compute and communicate with hand-held and other infrastructure devices. As most of the devices may be battery operated, due to less processing power the security and privacy is a major issue in IoT. Authentication, Identification and device heterogeneity are the major security and privacy concerns in IoT. Major challenges include integration, scalability, ethics communication mechanism, business models and surveillance. In this paper major issues related to security and privacy of IoT are focused.read more
Citations
More filters
Journal ArticleDOI
Efficient data perturbation for privacy preserving and accurate data stream mining
TL;DR: An efficient data stream perturbation method (named as P^2RoCAl) is proposed, which offers better data utility than similar methods and provides higher resilience against data reconstruction attacks.
Journal ArticleDOI
The internet of things security: A survey encompassing unexplored areas and new insights
Abiodun Esther Omolara,Abiodun Esther Omolara,Abdullah Alabdulatif,Oludare Isaac Abiodun,Oludare Isaac Abiodun,Moatsum Alawida,Moatsum Alawida,Abdulatif Alabdulatif,Wafa' Hamdan Alshoura,Humaira Arshad,Humaira Arshad +10 more
TL;DR: In this paper, a systematic literature review of over 200 articles is presented to provide new insights into the security of IoTs, taking cognizant of its social, economic, technical and legal implications, which will be beneficial to researchers, manufacturers, individuals, organizations and governments.
LoRaWAN: Vulnerability Analysis and Practical Expoitation
TL;DR: This research summarizes the secure features of LoRaWAN in the aspects of activation methods, key management, cryptography, counter management and message acknowledgement, and attacks based on these features are designed and described via an attack tree method.
Comprehensive Performance Analysis of RPL Objective Functions in IoT Networks
TL;DR: In fixed networks, the results show that OF0 usually perform better than MRHOF in terms of Energy Consumption, Convergence Time in the Static-Grid Topology, Listen Duty Cycle, and Transmit Duty Cycle.
References
More filters
Journal ArticleDOI
Wireless sensor networks: a survey
TL;DR: The concept of sensor networks which has been made viable by the convergence of micro-electro-mechanical systems technology, wireless communications and digital electronics is described.
Journal ArticleDOI
Wireless sensor network survey
TL;DR: This survey presents a comprehensive review of the recent literature since the publication of a survey on sensor networks, and gives an overview of several new applications and then reviews the literature on various aspects of WSNs.
Journal ArticleDOI
Internet of things: Vision, applications and research challenges
TL;DR: A survey of technologies, applications and research challenges for Internetof-Things is presented, in which digital and physical entities can be linked by means of appropriate information and communication technologies to enable a whole new class of applications and services.
Journal ArticleDOI
RFID security and privacy: a research survey
TL;DR: This survey examines approaches proposed by scientists for privacy protection and integrity assurance in RFID systems, and treats the social and technical context of their work.
Wireless Sensor Network -A Survey
Nirvika Chouhan,Rekha Jain +1 more
TL;DR: In this paper, various issues are discussed that actually put the limitations in the well working and the life time of the network.